Search

Your search keyword '"Zhang, Xiangyu"' showing total 5,371 results

Search Constraints

Start Over You searched for: Author "Zhang, Xiangyu" Remove constraint Author: "Zhang, Xiangyu"
5,371 results on '"Zhang, Xiangyu"'

Search Results

1. DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation

2. Auto-Landmark: Acoustic Landmark Dataset and Open-Source Toolkit for Landmark Extraction

3. ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation

4. Rethinking Mamba in Speech Processing by Self-Supervised Models

5. Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method

6. An Explicit Wavefunction of the Interacting Non-Hermitian Spin-1/2 1D System

7. General OCR Theory: Towards OCR-2.0 via a Unified End-to-end Model

8. Discovery of False Data Injection Schemes on Frequency Controllers with Reinforcement Learning

9. Panacea+: Panoramic and Controllable Video Generation for Autonomous Driving

10. XNN: Paradigm Shift in Mitigating Identity Leakage within Cloud-Enabled Deep Learning

11. Poisoning with A Pill: Circumventing Detection in Federated Learning

12. Unveiling the Milky Way dust extinction curve in 3D

13. An Empirical Extinction Curve Revealed by Gaia XP Spectra and LAMOST

14. UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

15. DeCE: Deceptive Cross-Entropy Loss Designed for Defending Backdoor Attacks

16. DreamBench++: A Human-Aligned Benchmark for Personalized Image Generation

17. Binaural Selective Attention Model for Target Speaker Extraction

18. RL-JACK: Reinforcement Learning-powered Black-box Jailbreaking Attack against LLMs

19. When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search

20. CodeScore-R: An Automated Robustness Metric for Assessing the FunctionalCorrectness of Code Synthesis

21. Self-supervised Adversarial Training of Monocular Depth Estimation against Physical-World Attacks

22. Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders

23. Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases

24. Is a 3D-Tokenized LLM the Key to Reliable Autonomous Driving?

25. Reflected Flow Matching

26. Focus Anywhere for Fine-grained Multi-page Document Understanding

27. Mamba in Speech: Towards an Alternative to Self-Attention

28. Striking a Balance between Classical and Deep Learning Approaches in Natural Language Processing Pedagogy

29. Music Emotion Prediction Using Recurrent Neural Networks

30. Self-Supervised Visual Preference Alignment

31. Threat Behavior Textual Search by Attention Graph Isomorphism

32. OneChart: Purify the Chart Structural Extraction via One Auxiliary Token

33. BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks

34. SubjectDrive: Scaling Generative Data in Autonomous Driving via Subject Control

35. LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

36. Aligning Speech to Languages to Enhance Code-switching Speech Recognition

37. CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking

38. When LLMs Meets Acoustic Landmarks: An Efficient Approach to Integrate Speech into Large Language Models for Depression Detection

39. When Dataflow Analysis Meets Large Language Models

40. Speaking in Wavelet Domain: A Simple and Efficient Approach to Speed up Speech Diffusion Model

41. Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

46. MULTIVERSE: Exposing Large Language Model Alignment Problems in Diverse Worlds

47. Small Language Model Meets with Reinforced Vision Vocabulary

48. Slot-guided Volumetric Object Radiance Fields

49. Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs

50. AutoTask: Executing Arbitrary Voice Commands by Exploring and Learning from Mobile GUI

Catalog

Books, media, physical & digital resources